Results 41 to 50 of about 139,929 (306)

Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing [PDF]

open access: yes, 2010
In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptographic hash function family by 2012. In the selection process, hardware performances of the candidates will play an important role.
Akın, Abdulkadir   +6 more
core   +2 more sources

Pipelined Key Switching Accelerator Architecture for CKKS-Based Fully Homomorphic Encryption

open access: yesSensors, 2023
The increasing ubiquity of big data and cloud-based computing has led to increased concerns regarding the privacy and security of user data. In response, fully homomorphic encryption (FHE) was developed to address this issue by enabling arbitrary ...
Phap Ngoc Duong, Hanho Lee
doaj   +1 more source

Building a Secure Scheme for a Trusted Hardware Sharing Environment

open access: yesIEEE Access, 2017
Trusted hardware sharing (THS) system can provide multiple trusted execution environments (TEE) via sharing the trusted hardware (e.g., sharing trusted platform module via virtualization) for stand-alone and isolation scenarios.
Di Lu   +5 more
doaj   +1 more source

Remote attestation mechanism for embedded devices based on physical unclonable functions [PDF]

open access: yes, 2013
Remote attestation mechanisms are well studied in the high-end computing environments; however, the same is not true for embedded devices-especially for smart cards.
Akram, Raja Naeem   +2 more
core   +2 more sources

Meniscus Pixel Printing for Contact‐Lens Vision Sensing and Robotic Control

open access: yesAdvanced Functional Materials, EarlyView.
A visual‐sensing contact lens is enabled by meniscus pixel printing (MPP), which rapidly patterns a 200 µm perovskite photodetector pixel in 1 s without masks, vacuum processing, or bulky equipment. A deep‐learning‐based super‐resolution reconstructs sparse on‐lens signals into 80 × 80 high‐resolution visual information, while AI‐driven eye‐tracking ...
Byung‐Hoon Gong   +7 more
wiley   +1 more source

SofTEE: Software-Based Trusted Execution Environment for User Applications

open access: yesIEEE Access, 2020
Commodity operating systems are considered vulnerable. Therefore, when an application handles security-sensitive data, it is highly recommended to run the application in a trusted execution environment.
Unsung Lee, Chanik Park
doaj   +1 more source

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]

open access: yes, 2017
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea   +5 more
core   +1 more source

A new Definition and Classification of Physical Unclonable Functions

open access: yes, 2015
A new definition of "Physical Unclonable Functions" (PUFs), the first one that fully captures its intuitive idea among experts, is presented. A PUF is an information-storage system with a security mechanism that is 1. meant to impede the duplication of
Merli, Dominik, Plaga, Rainer
core   +1 more source

Atomic Layer Deposition in Transistors and Monolithic 3D Integration

open access: yesAdvanced Functional Materials, EarlyView.
Transistors are fundamental building blocks of modern electronics. This review summarizes recent progress in atomic layer deposition (ALD) for the synthesis of two‐dimensional (2D) metal oxides and transition‐metal dichalcogenides (TMDCs), with particular emphasis on their enabling role in monolithic three‐dimensional (M3D) integration for next ...
Yue Liu   +5 more
wiley   +1 more source

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy